APPLIED/cmnt: [Eoan 0/5] CVE-2019-3016
Kleber Souza
kleber.souza at canonical.com
Fri Feb 14 15:13:53 UTC 2020
On 31.01.20 12:06, Thadeu Lima de Souza Cascardo wrote:
> This has been built on all platforms and smoke tested as a host on x86 and
> ppc64el.
>
> Boris Ostrovsky (5):
> UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
> UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
> UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
> UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
> missed
> UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
>
> arch/x86/include/asm/kvm_host.h | 4 +-
> arch/x86/kvm/x86.c | 67 ++++++++++++-------
> include/linux/kvm_host.h | 5 ++
> include/linux/kvm_types.h | 9 ++-
> virt/kvm/kvm_main.c | 113 +++++++++++++++++++++++++++-----
> 5 files changed, 153 insertions(+), 45 deletions(-)
>
Applied to eoan/linux, cherry-picking/backporting the patches from
mainline as noted by Stefan.
Thanks,
Kleber
More information about the kernel-team
mailing list